Checkmarx SCA is the Software Composition Analysis engine inside Checkmarx One. It scans open-source dependencies in package manifests (package.json, pom.xml, requirements.txt, go.mod, Cargo.toml, Gemfile, composer.json, build.gradle, *.csproj) and the resolved transitive graph, then matches against the CVE database, license catalog, and known-bad indicators. Same shape as Snyk SCA, Black Duck, or Sonatype Lifecycle, with the differentiator being how Checkmarx reduces the noise.
Exploitable Path Analysis (EPA) is the load-bearing capability. A traditional SCA tool reports every CVE in every dependency in the tree. Most of those CVEs sit in code paths that the application never calls. EPA performs reachability analysis on the customer's actual code (cross-checked with Checkmarx SAST) and downgrades CVEs in unreachable code to a lower severity. On portfolios with deep dependency trees, EPA reduces the AppSec backlog by a meaningful margin because findings reflect what an attacker can exploit instead of every theoretically vulnerable line.
License compliance is the other half of SCA. Programs that ship code with copyleft licenses (GPL, AGPL) into proprietary products create legal exposure. Checkmarx SCA evaluates every dependency against a configurable license policy and flags forbidden licenses before they reach production. License policy is per-application or per-business-unit so internal-only tooling does not get audited like a customer-facing SaaS product.
What stalls SCA adoption is alert fatigue. Programs that take vendor-default policies, ignore EPA, and route every CVE finding to the developer queue burn out the engineering organization and the AppSec team simultaneously. Merito's engagement starts with EPA on by default, license-policy tuning, suppression workflow with audit trail, and developer-time integration that surfaces findings during PR review rather than as a separate dashboard. Without that, SCA generates more noise than it removes.
Ideal use cases
- Reachability-aware SCA on heterogeneous codebases with deep dependency trees
- License compliance enforcement (GPL, AGPL, copyleft policy gates)
- PR-time SCA gates in Jenkins, GitHub Actions, GitLab CI, Azure DevOps, Bitbucket
- SBOM generation for SBOM-required regulated programs
- SCA consolidation off Snyk, Black Duck, or Sonatype Lifecycle onto Checkmarx One